Vulnerabilities (CVE)

Filtered by vendor Wuzhicms Subscribe
Total 58 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-24930 1 Wuzhicms 1 Wuzhicms 2021-10-06 5.5 MEDIUM 8.1 HIGH
Beijing Wuzhi Internet Technology Co., Ltd. Wuzhi CMS 4.0.1 is an open source content management system. The five fingers CMS backend in***.php file has arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.
CVE-2020-19551 1 Wuzhicms 1 Wuzhicms 2021-10-01 6.5 MEDIUM 8.8 HIGH
Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.
CVE-2020-19553 1 Wuzhicms 1 Wuzhicms 2021-09-29 3.5 LOW 5.4 MEDIUM
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
CVE-2020-19915 1 Wuzhicms 1 Wuzhicms 2021-09-29 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS vulnerability exists in WUZHI CMS 4.1.0 via the mailbox username in index.php.
CVE-2021-40674 1 Wuzhicms 1 Wuzhicms 2021-09-28 7.5 HIGH 9.8 CRITICAL
An SQL injection vulnerability exists in Wuzhi CMS v4.1.0 via the KeyValue parameter in coreframe/app/order/admin/index.php.
CVE-2021-40670 1 Wuzhicms 1 Wuzhicms 2021-09-27 7.5 HIGH 9.8 CRITICAL
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords iparameter under the /coreframe/app/order/admin/card.php file.
CVE-2021-40669 1 Wuzhicms 1 Wuzhicms 2021-09-27 7.5 HIGH 9.8 CRITICAL
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords parameter under the coreframe/app/promote/admin/index.php file.
CVE-2020-18877 1 Wuzhicms 1 Wuzhicms 2021-08-23 5.0 MEDIUM 7.5 HIGH
SQL Injection in Wuzhi CMS v4.1.0 allows remote attackers to obtain sensitive information via the 'flag' parameter in the component '/coreframe/app/order/admin/index.php'.
CVE-2020-18654 1 Wuzhicms 1 Wuzhicms 2021-06-24 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php".
CVE-2020-21590 1 Wuzhicms 1 Wuzhicms 2021-04-08 4.0 MEDIUM 4.3 MEDIUM
Directory traversal in coreframe/app/template/admin/index.php in WUZHI CMS 4.1.0 allows attackers to list files in arbitrary directories via the dir parameter.
CVE-2018-9927 1 Wuzhicms 1 Wuzhicms 2019-02-27 6.8 MEDIUM 8.8 HIGH
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can add a user account via index.php?m=member&f=index&v=add.
CVE-2018-9926 1 Wuzhicms 1 Wuzhicms 2019-02-27 6.8 MEDIUM 8.8 HIGH
An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can add an admin account via index.php?m=core&f=power&v=add.
CVE-2019-9108 1 Wuzhicms 1 Wuzhicms 2019-02-25 4.3 MEDIUM 6.1 MEDIUM
XSS exists in WUZHI CMS 4.1.0 via index.php?m=core&f=map&v=baidumap&x=[XSS]&y=[XSS] to coreframe/app/core/map.php.
CVE-2018-20572 1 Wuzhicms 1 Wuzhicms 2019-01-09 7.5 HIGH 9.8 CRITICAL
WUZHI CMS 4.1.0 allows coreframe/app/coupon/admin/copyfrom.php SQL injection via the index.php?m=promote&f=index&v=search keywords parameter, a related issue to CVE-2018-15893.
CVE-2018-17832 1 Wuzhicms 1 Wuzhi Cms 2018-11-15 4.3 MEDIUM 6.1 MEDIUM
XSS exists in WUZHI CMS 2.0 via the index.php v or f parameter.
CVE-2018-14472 1 Wuzhicms 1 Wuzhicms 2018-09-14 6.5 MEDIUM 7.2 HIGH
An issue was discovered in WUZHI CMS 4.1.0. The vulnerable file is coreframe/app/order/admin/goods.php. The $keywords parameter is taken directly into execution without any filtering, leading to SQL injection.
CVE-2018-11722 1 Wuzhicms 1 Wuzhicms 2018-07-23 7.5 HIGH 9.8 CRITICAL
WUZHI CMS 4.1.0 has a SQL Injection in api/uc.php via the 'code' parameter, because 'UC_KEY' is hard coded.
CVE-2018-10221 1 Wuzhicms 1 Wuzhicms 2018-05-21 3.5 LOW 5.4 MEDIUM
An issue was discovered in WUZHI CMS V4.1.0. There is a persistent XSS vulnerability that can steal the administrator cookies via the tag[tag] parameter to the index.php?m=tags&f=index&v=add&&_su=wuzhicms URI. After a website editor (whose privilege is lower than the administrator) logs in, he can add a new TAGS with the XSS payload.